Abstract
In this paper, a new type of algorithm is proposed in which steganography is combined with cryptography for concealing secret data in a digital image with multilayer security. A flexible matrix is used in combination with Pythagorean Theorem to develop a novel symmetric key to add a double layer of security to the secret data. Third layer of security to the data is added using a modified form of moderate significant bit alteration technique. In addition to this, pixel adjustment process is also improved upon to improve the visual perception of stego-imagesubstantially. In order to examine the visual perception of the stego-image qualitatively, histogram analysis is carried out. Image-quality-metrics are also estimated in order to evaluate the quality of the stego-images quantitatively. Moreover, in order to validate the effectiveness of the proposed algorithm, T-test is applied at 1 % level of significance. It has been validated experimentally that the proposed algorithm provides higher security as well as robustness to the attacks on the stego-image. The results of this study are, in fact, quite promising.
Similar content being viewed by others
References
Abhilash G, Sudhakar KN, Mungara J (2012) Advanced symmetric keycryptography using extended MSA method: BLZ symmetric key algorithm. Int J Comput Sci Eng Technol 2(7):1321–1326
Amirtharajan R, Rayappan JBB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci 193:115–124
Apostol TM (1976) Introduction to Analytic Number theory. Springer
Balkrishan SAP (2010) Hiding encrypted data using randomly chosen moderate bit insertion in digital imagesteganography. Int J Comput Sci Eng 1(2):21–27
Balkrishan SAP (2013) Enhanced bandwidth utilization in image steganography with enhanced data security. Int J Comput Appl 84(11):31–38
Balkrishan, Singh AP (2011) Moderate bit insertion for hiding crypto data in digital image for steganography. IJCA, Special issues on IP Multimedia Communications 136–138
Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3 & 4):313–336
Chan CK, Cheng LM (2001) Improved hiding data in images by optimal moderately-significant-bit replacement. Electron Lett 37(16):1018–1019
Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474
Chang CC, Hsiao JY, Chan CS (2003) Finding optimal lsb substitution in image hiding by dynamic programming strategy. Pattern Recogn 36(7):1583–1595
Chang CC, Lin MH, Hu YC (2002) A fast and secure image hiding scheme based on LSB substitution. Int J Pattern Recognit Artif Intell 16(4):399–416
Cheddad A, Condell J, Curran K, Kevitts PM (2010) Digital image steganography: surveyand analysis of current methods. Signal Process 90(3):727–52
Cheddad A, Condell J, Curran K, McKevitt P (2010) A hash-based image encryption algorithm. Opt Commun 283(6):879–893
Chen LS, Zheng GX (2005) Chaos-based encryption for digital images and videos. In Furht, B. & Kirovski, D. Multimedia Security Handbook. CRC Press
Dey S, Nath J, Nath A (2012) An advanced combined symmetric key cryptographic method using bit manipulation, bit reversal, modified caesar cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm. Int J Comput Appl 46(20):46–53
Forouzan BA (2008) Cryptography and network security. Publisher McGraw-Hill Higher Education, India
Gonzalez RC, Woods RE (2003) Digital image processing, 3rd edn. Prentice-Hall, Englewood Cliffs
Guha S, Das T, Ghosh S, Nath J, Das S, Nath A (2012) A new data hiding algorithm withencrypted secret message using TTJSA symmetric key crypto system. J Global Res Comput Sci 3(4):11–16
Jindal B, Singh AP (2013) Camouflaging in digital image for secure communication. J IE(I)-Springer Electric Electron Telecommun Comput Eng 94(2):85–92
Jindal B, Singh AP (2014) Image steganography with multilayer security using moderate bit substitution. J Appl Sci 14(8):738–747
Pol K (2014) Image steganography based on DWT using Huffman LWZ Encoding. Int J Eng Tech Res 2(3):100–103
Potdar VM, Chang E (2004) Grey level modification steganography for secret communication. In Proceedings of IEEE 2nd International Conference on Industrial Informatics INDIN 04, Berlin, Germany 223 – 228
Rajyaguru MH (2012) Crystography combination of cryptography and steganography with rapidly changing keys. Int J Emerg Technol Ad Eng 2(10):329–332
Satir E, Isik H (2012) A compression-based text steganography method. J Syst Softw 85(10):2385–2394
Satir E, Isik H (2014) A Huffman compression based text Steganography method. Multimed Tools Appli 70(3):1–26
Thien CC, Lin JC (2003) A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn 36(12):2875–2881
Usha S, Kumar GAS, Boopathybagan K (2011) A secure triple level encryption methodusing cryptography and steganography. In Proceeding of IEEE International Conference on Computer Science and Network Technology (ICCSNT), Harbin, 24–26 Dec. vol. 2, 1017–1020
Usman K, Juzoji H, Nakajima I, Soegidjoko S, Ramdhani M, Hori T, Igi S(2007) Medical image encryption based on pixel arrangement and random permutation for transmission security. In Proceeding of 9th IEEE International Conference on e-Health Networking, Application and Services, Taipei, Taiwan. 19–22 Jun. 244–247
Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Proc Lett 9(3):81–84
Wang RZ, Lin CF, Lin JC (2000) Hiding data in images by optimal moderately-significant-bit replacement. Electron Lett 36(25):2069–2070
Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recogn 34(3):671–683
Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9–10):1613–1626
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Balkrishan, J., Singh, A.P. Concealing data in a digital image with multilayer security. Multimed Tools Appl 75, 7045–7063 (2016). https://doi.org/10.1007/s11042-015-2631-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2631-4